Documentation ¶
Index ¶
- func NetappActiveDirectory_GenerateConfigForImport(scope constructs.Construct, importToId *string, importFromId *string, ...) cdktf.ImportableResource
- func NetappActiveDirectory_IsConstruct(x interface{}) *bool
- func NetappActiveDirectory_IsTerraformElement(x interface{}) *bool
- func NetappActiveDirectory_IsTerraformResource(x interface{}) *bool
- func NetappActiveDirectory_TfResourceType() *string
- func NewNetappActiveDirectoryTimeoutsOutputReference_Override(n NetappActiveDirectoryTimeoutsOutputReference, ...)
- func NewNetappActiveDirectory_Override(n NetappActiveDirectory, scope constructs.Construct, id *string, ...)
- type NetappActiveDirectory
- type NetappActiveDirectoryConfig
- type NetappActiveDirectoryTimeouts
- type NetappActiveDirectoryTimeoutsOutputReference
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func NetappActiveDirectory_GenerateConfigForImport ¶
func NetappActiveDirectory_GenerateConfigForImport(scope constructs.Construct, importToId *string, importFromId *string, provider cdktf.TerraformProvider) cdktf.ImportableResource
Generates CDKTF code for importing a NetappActiveDirectory resource upon running "cdktf plan <stack-name>".
func NetappActiveDirectory_IsConstruct ¶
func NetappActiveDirectory_IsConstruct(x interface{}) *bool
Checks if `x` is a construct.
Use this method instead of `instanceof` to properly detect `Construct` instances, even when the construct library is symlinked.
Explanation: in JavaScript, multiple copies of the `constructs` library on disk are seen as independent, completely different libraries. As a consequence, the class `Construct` in each copy of the `constructs` library is seen as a different class, and an instance of one class will not test as `instanceof` the other class. `npm install` will not create installations like this, but users may manually symlink construct libraries together or use a monorepo tool: in those cases, multiple copies of the `constructs` library can be accidentally installed, and `instanceof` will behave unpredictably. It is safest to avoid using `instanceof`, and using this type-testing method instead.
Returns: true if `x` is an object created from a class which extends `Construct`.
func NetappActiveDirectory_IsTerraformElement ¶
func NetappActiveDirectory_IsTerraformElement(x interface{}) *bool
Experimental.
func NetappActiveDirectory_IsTerraformResource ¶
func NetappActiveDirectory_IsTerraformResource(x interface{}) *bool
Experimental.
func NetappActiveDirectory_TfResourceType ¶
func NetappActiveDirectory_TfResourceType() *string
func NewNetappActiveDirectoryTimeoutsOutputReference_Override ¶
func NewNetappActiveDirectoryTimeoutsOutputReference_Override(n NetappActiveDirectoryTimeoutsOutputReference, terraformResource cdktf.IInterpolatingParent, terraformAttribute *string)
func NewNetappActiveDirectory_Override ¶
func NewNetappActiveDirectory_Override(n NetappActiveDirectory, scope constructs.Construct, id *string, config *NetappActiveDirectoryConfig)
Create a new {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory google_netapp_active_directory} Resource.
Types ¶
type NetappActiveDirectory ¶
type NetappActiveDirectory interface { cdktf.TerraformResource AesEncryption() interface{} SetAesEncryption(val interface{}) AesEncryptionInput() interface{} BackupOperators() *[]*string SetBackupOperators(val *[]*string) BackupOperatorsInput() *[]*string // Experimental. CdktfStack() cdktf.TerraformStack // Experimental. Connection() interface{} // Experimental. SetConnection(val interface{}) // Experimental. ConstructNodeMetadata() *map[string]interface{} // Experimental. Count() interface{} // Experimental. SetCount(val interface{}) CreateTime() *string // Experimental. DependsOn() *[]*string // Experimental. SetDependsOn(val *[]*string) Description() *string SetDescription(val *string) DescriptionInput() *string Dns() *string SetDns(val *string) DnsInput() *string Domain() *string SetDomain(val *string) DomainInput() *string EffectiveLabels() cdktf.StringMap EncryptDcConnections() interface{} SetEncryptDcConnections(val interface{}) EncryptDcConnectionsInput() interface{} // Experimental. ForEach() cdktf.ITerraformIterator // Experimental. SetForEach(val cdktf.ITerraformIterator) // Experimental. Fqn() *string // Experimental. FriendlyUniqueId() *string Id() *string SetId(val *string) IdInput() *string KdcHostname() *string SetKdcHostname(val *string) KdcHostnameInput() *string KdcIp() *string SetKdcIp(val *string) KdcIpInput() *string Labels() *map[string]*string SetLabels(val *map[string]*string) LabelsInput() *map[string]*string LdapSigning() interface{} SetLdapSigning(val interface{}) LdapSigningInput() interface{} // Experimental. Lifecycle() *cdktf.TerraformResourceLifecycle // Experimental. SetLifecycle(val *cdktf.TerraformResourceLifecycle) Location() *string SetLocation(val *string) LocationInput() *string Name() *string SetName(val *string) NameInput() *string NetBiosPrefix() *string SetNetBiosPrefix(val *string) NetBiosPrefixInput() *string NfsUsersWithLdap() interface{} SetNfsUsersWithLdap(val interface{}) NfsUsersWithLdapInput() interface{} // The tree node. Node() constructs.Node OrganizationalUnit() *string SetOrganizationalUnit(val *string) OrganizationalUnitInput() *string Password() *string SetPassword(val *string) PasswordInput() *string Project() *string SetProject(val *string) ProjectInput() *string // Experimental. Provider() cdktf.TerraformProvider // Experimental. SetProvider(val cdktf.TerraformProvider) // Experimental. Provisioners() *[]interface{} // Experimental. SetProvisioners(val *[]interface{}) // Experimental. RawOverrides() interface{} SecurityOperators() *[]*string SetSecurityOperators(val *[]*string) SecurityOperatorsInput() *[]*string Site() *string SetSite(val *string) SiteInput() *string State() *string StateDetails() *string // Experimental. TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata TerraformLabels() cdktf.StringMap // Experimental. TerraformMetaArguments() *map[string]interface{} // Experimental. TerraformResourceType() *string Timeouts() NetappActiveDirectoryTimeoutsOutputReference TimeoutsInput() interface{} Username() *string SetUsername(val *string) UsernameInput() *string // Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. // Experimental. AddMoveTarget(moveTarget *string) // Experimental. AddOverride(path *string, value interface{}) // Experimental. GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} // Experimental. GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable // Experimental. GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool // Experimental. GetListAttribute(terraformAttribute *string) *[]*string // Experimental. GetNumberAttribute(terraformAttribute *string) *float64 // Experimental. GetNumberListAttribute(terraformAttribute *string) *[]*float64 // Experimental. GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 // Experimental. GetStringAttribute(terraformAttribute *string) *string // Experimental. GetStringMapAttribute(terraformAttribute *string) *map[string]*string // Experimental. HasResourceMove() interface{} // Experimental. ImportFrom(id *string, provider cdktf.TerraformProvider) // Experimental. InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable // Move the resource corresponding to "id" to this resource. // // Note that the resource being moved from must be marked as moved using it's instance function. // Experimental. MoveFromId(id *string) // Moves this resource to the target resource given by moveTarget. // Experimental. MoveTo(moveTarget *string, index interface{}) // Moves this resource to the resource corresponding to "id". // Experimental. MoveToId(id *string) // Overrides the auto-generated logical ID with a specific ID. // Experimental. OverrideLogicalId(newLogicalId *string) PutTimeouts(value *NetappActiveDirectoryTimeouts) ResetAesEncryption() ResetBackupOperators() ResetDescription() ResetEncryptDcConnections() ResetId() ResetKdcHostname() ResetKdcIp() ResetLabels() ResetLdapSigning() ResetNfsUsersWithLdap() ResetOrganizationalUnit() // Resets a previously passed logical Id to use the auto-generated logical id again. // Experimental. ResetOverrideLogicalId() ResetProject() ResetSecurityOperators() ResetSite() ResetTimeouts() SynthesizeAttributes() *map[string]interface{} SynthesizeHclAttributes() *map[string]interface{} // Experimental. ToHclTerraform() interface{} // Experimental. ToMetadata() interface{} // Returns a string representation of this construct. ToString() *string // Adds this resource to the terraform JSON output. // Experimental. ToTerraform() interface{} }
Represents a {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory google_netapp_active_directory}.
func NewNetappActiveDirectory ¶
func NewNetappActiveDirectory(scope constructs.Construct, id *string, config *NetappActiveDirectoryConfig) NetappActiveDirectory
Create a new {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory google_netapp_active_directory} Resource.
type NetappActiveDirectoryConfig ¶
type NetappActiveDirectoryConfig struct { // Experimental. Connection interface{} `field:"optional" json:"connection" yaml:"connection"` // Experimental. Count interface{} `field:"optional" json:"count" yaml:"count"` // Experimental. DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` // Experimental. ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` // Experimental. Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` // Experimental. Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` // Experimental. Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // Comma separated list of DNS server IP addresses for the Active Directory domain. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#dns NetappActiveDirectory#dns} Dns *string `field:"required" json:"dns" yaml:"dns"` // Fully qualified domain name for the Active Directory domain. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#domain NetappActiveDirectory#domain} Domain *string `field:"required" json:"domain" yaml:"domain"` // Name of the region for the policy to apply to. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#location NetappActiveDirectory#location} Location *string `field:"required" json:"location" yaml:"location"` // The resource name of the Active Directory pool. Needs to be unique per location. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#name NetappActiveDirectory#name} Name *string `field:"required" json:"name" yaml:"name"` // NetBIOS name prefix of the server to be created. // // A five-character random ID is generated automatically, for example, -6f9a, and appended to the prefix. The full UNC share path will have the following format: // '\\NetBIOS_PREFIX-ABCD.DOMAIN_NAME\SHARE_NAME' // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#net_bios_prefix NetappActiveDirectory#net_bios_prefix} NetBiosPrefix *string `field:"required" json:"netBiosPrefix" yaml:"netBiosPrefix"` // Password for specified username. // // Note - Manual changes done to the password will not be detected. Terraform will not re-apply the password, unless you use a new password in Terraform. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#password NetappActiveDirectory#password} Password *string `field:"required" json:"password" yaml:"password"` // Username for the Active Directory account with permissions to create the compute account within the specified organizational unit. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#username NetappActiveDirectory#username} Username *string `field:"required" json:"username" yaml:"username"` // Enables AES-128 and AES-256 encryption for Kerberos-based communication with Active Directory. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#aes_encryption NetappActiveDirectory#aes_encryption} AesEncryption interface{} `field:"optional" json:"aesEncryption" yaml:"aesEncryption"` // Domain user/group accounts to be added to the Backup Operators group of the SMB service. // // The Backup Operators group allows members to backup and restore files regardless of whether they have read or write access to the files. Comma-separated list. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#backup_operators NetappActiveDirectory#backup_operators} BackupOperators *[]*string `field:"optional" json:"backupOperators" yaml:"backupOperators"` // An optional description of this resource. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#description NetappActiveDirectory#description} Description *string `field:"optional" json:"description" yaml:"description"` // If enabled, traffic between the SMB server to Domain Controller (DC) will be encrypted. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#encrypt_dc_connections NetappActiveDirectory#encrypt_dc_connections} EncryptDcConnections interface{} `field:"optional" json:"encryptDcConnections" yaml:"encryptDcConnections"` // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#id NetappActiveDirectory#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // Hostname of the Active Directory server used as Kerberos Key Distribution Center. Only requried for volumes using kerberized NFSv4.1. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#kdc_hostname NetappActiveDirectory#kdc_hostname} KdcHostname *string `field:"optional" json:"kdcHostname" yaml:"kdcHostname"` // IP address of the Active Directory server used as Kerberos Key Distribution Center. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#kdc_ip NetappActiveDirectory#kdc_ip} KdcIp *string `field:"optional" json:"kdcIp" yaml:"kdcIp"` // Labels as key value pairs. Example: '{ "owner": "Bob", "department": "finance", "purpose": "testing" }'. // // **Note**: This field is non-authoritative, and will only manage the labels present in your configuration. // Please refer to the field 'effective_labels' for all of the labels present on the resource. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#labels NetappActiveDirectory#labels} Labels *map[string]*string `field:"optional" json:"labels" yaml:"labels"` // Specifies whether or not the LDAP traffic needs to be signed. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#ldap_signing NetappActiveDirectory#ldap_signing} LdapSigning interface{} `field:"optional" json:"ldapSigning" yaml:"ldapSigning"` // Local UNIX users on clients without valid user information in Active Directory are blocked from access to LDAP enabled volumes. // // This option can be used to temporarily switch such volumes to AUTH_SYS authentication (user ID + 1-16 groups). // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#nfs_users_with_ldap NetappActiveDirectory#nfs_users_with_ldap} NfsUsersWithLdap interface{} `field:"optional" json:"nfsUsersWithLdap" yaml:"nfsUsersWithLdap"` // Name of the Organizational Unit where you intend to create the computer account for NetApp Volumes. // // Defaults to 'CN=Computers' if left empty. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#organizational_unit NetappActiveDirectory#organizational_unit} OrganizationalUnit *string `field:"optional" json:"organizationalUnit" yaml:"organizationalUnit"` // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#project NetappActiveDirectory#project}. Project *string `field:"optional" json:"project" yaml:"project"` // Domain accounts that require elevated privileges such as 'SeSecurityPrivilege' to manage security logs. Comma-separated list. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#security_operators NetappActiveDirectory#security_operators} SecurityOperators *[]*string `field:"optional" json:"securityOperators" yaml:"securityOperators"` // Specifies an Active Directory site to manage domain controller selection. // // Use when Active Directory domain controllers in multiple regions are configured. Defaults to 'Default-First-Site-Name' if left empty. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#site NetappActiveDirectory#site} Site *string `field:"optional" json:"site" yaml:"site"` // timeouts block. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#timeouts NetappActiveDirectory#timeouts} Timeouts *NetappActiveDirectoryTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` }
type NetappActiveDirectoryTimeouts ¶
type NetappActiveDirectoryTimeouts struct { // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#create NetappActiveDirectory#create}. Create *string `field:"optional" json:"create" yaml:"create"` // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#delete NetappActiveDirectory#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.31.1/docs/resources/netapp_active_directory#update NetappActiveDirectory#update}. Update *string `field:"optional" json:"update" yaml:"update"` }
type NetappActiveDirectoryTimeoutsOutputReference ¶
type NetappActiveDirectoryTimeoutsOutputReference interface { cdktf.ComplexObject // the index of the complex object in a list. // Experimental. ComplexObjectIndex() interface{} // Experimental. SetComplexObjectIndex(val interface{}) // set to true if this item is from inside a set and needs tolist() for accessing it set to "0" for single list items. // Experimental. ComplexObjectIsFromSet() *bool // Experimental. SetComplexObjectIsFromSet(val *bool) Create() *string SetCreate(val *string) CreateInput() *string // The creation stack of this resolvable which will be appended to errors thrown during resolution. // // If this returns an empty array the stack will not be attached. // Experimental. CreationStack() *[]*string Delete() *string SetDelete(val *string) DeleteInput() *string // Experimental. Fqn() *string InternalValue() interface{} SetInternalValue(val interface{}) // Experimental. TerraformAttribute() *string // Experimental. SetTerraformAttribute(val *string) // Experimental. TerraformResource() cdktf.IInterpolatingParent // Experimental. SetTerraformResource(val cdktf.IInterpolatingParent) Update() *string SetUpdate(val *string) UpdateInput() *string // Experimental. ComputeFqn() *string // Experimental. GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} // Experimental. GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable // Experimental. GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool // Experimental. GetListAttribute(terraformAttribute *string) *[]*string // Experimental. GetNumberAttribute(terraformAttribute *string) *float64 // Experimental. GetNumberListAttribute(terraformAttribute *string) *[]*float64 // Experimental. GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 // Experimental. GetStringAttribute(terraformAttribute *string) *string // Experimental. GetStringMapAttribute(terraformAttribute *string) *map[string]*string // Experimental. InterpolationAsList() cdktf.IResolvable // Experimental. InterpolationForAttribute(property *string) cdktf.IResolvable ResetCreate() ResetDelete() ResetUpdate() // Produce the Token's value at resolution time. // Experimental. Resolve(_context cdktf.IResolveContext) interface{} // Return a string representation of this resolvable object. // // Returns a reversible string representation. // Experimental. ToString() *string }
func NewNetappActiveDirectoryTimeoutsOutputReference ¶
func NewNetappActiveDirectoryTimeoutsOutputReference(terraformResource cdktf.IInterpolatingParent, terraformAttribute *string) NetappActiveDirectoryTimeoutsOutputReference